CVE-2025-59046
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-09-11

Assigner: GitHub, Inc.

Description
The npm package `interactive-git-checkout` is an interactive command-line tool that allows users to checkout a git branch while it prompts for the branch name on the command-line. It is available as an npm package and can be installed via `npm install -g interactive-git-checkout`. Versions up to and including 1.1.4 of the `interactive-git-checkout` tool are vulnerable to a command injection vulnerability because the software passes the branch name to the `git checkout` command using the Node.js child process module's `exec()` function without proper input validation or sanitization. Commit 8dd832dd302af287a61611f4f85e157cd1c6bb41 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-09-11
Generated
2026-05-07
AI Q&A
2025-09-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ninofiliu interactive-git-checkout 1.1.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the npm package 'interactive-git-checkout' is a command injection flaw. The tool takes a branch name input from the user and passes it directly to the 'git checkout' command using Node.js's exec() function without properly validating or sanitizing the input. This allows an attacker to inject malicious commands that get executed on the system.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary commands on the system where the 'interactive-git-checkout' tool is used. This can lead to full system compromise, including unauthorized access, data modification, or denial of service.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the `interactive-git-checkout` package to a version later than 1.1.4 where the issue is fixed (commit 8dd832dd302af287a61611f4f85e157cd1c6bb41). Avoid using vulnerable versions and ensure that any usage of this tool does not process untrusted input without validation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart